ENS 10.7: NAM 4-Day Endpoint Security Administration

Training Overview

Our Endpoint Security Administration training provides an in-depth introduction to the tasks crucial to set up & administer Endpoint Security. Endpoint Security combines Threat Prevention, Adaptive Threat Protection, Firewall, & Web Control to take immediate action against potentially dangerous applications, downloads, websites, & files. This training combines lectures & practical lab exercises, with significant time allocated for hands on interaction with the Endpoint Security user interface & policies, as well as detailed instructions for integration of this solution.

Duration: 4 days

Prerequisites

· Solid knowledge of Windows & system administration & network technologies

· Basic understanding of computer security, command line syntax, malware/anti-malware, virus/ antivirus, & web technologies.

· Working knowledge of ePO software

Audience Profile

This training is intended for system & network administrators, security personnel, auditors, and/or professionals concerned with system endpoint security.

Learning Objectives:

This training focuses on enabling you to do the following: 

· Identify key differences between ePolicy Orchestrator (ePO) On-Premises, ePolicy Orchestrator (ePO) Cloud, & MVISION ePO.

· Identify the steps to install Endpoint Security for use in ePolicy Orchestrator & standalone or self-managed environments.

· Identify the different ways to deploy the required software components to endpoint systems.

· Configure common settings that apply to all Endpoint Security modules & features

· Describe the purpose of Access Protection policies

· Describe the key features of ENS Exploit Prevention.

Content Outline

· Module 01 - Welcome

· Module 02 - Solution Overview

· Module 03 - Planning the Deployment

· Module 04 - ePolicy Orchestrator Overview

· Module 05 - Installing Endpoint Security Software

· Module 06 - Deploying the Endpoint Clients

· Module 07 - Using Endpoint Security Client

· Module 08 - Policy Management Overview

· Module 09 - Common Configuration Settings

· Module 10 - Threat Prevention: Configuring Access Protection

· Module 12 - Threat Prevention: Configuring On-Access Scanner

· Module 13 - Threat Prevention: Configuring On-Demand Scanners

· Module 14 - Configuring Threat Prevention Options

· Module 15 - Configuring Adaptive Threat Protection

· Module 16 - Firewall Overview & Configuring Firewall Options

· Module 17 - Configuring Firewall Rules & Groups

· Module 18 - Configuring Web Control

· Module 19 - Monitoring & Reporting

· Module 20 - ENS for Servers

· Module 21 - Protection Workspace

· Module 22 - Data Exchange Layer & Threat Intelligence

· Exchange Overview

FAQs

Trellix Endpoint Security (ENS) protects the productivity of users with a common service layer & our new anti malware core engine that helps reduce the number of resources & power required by a user's sys.

The Trellix ePO – On-prem console provides flexible, automated management capabilities so that you can rapidly identify, manage, & respond to vulnerabilities, changes in security postures, & known threats from a single console

ePolicy Orchestrator (ePO) is a centralized, scalable, extensible platform for security policy management & enforcement of enterprise networks & endpoints

This training focuses on enabling you to do the following: 

  • Identify key differences between ePolicy Orchestrator (ePO) On-Premises, ePolicy Orchestrator (ePO) Cloud, & MVISION ePO.
  • Identify the steps to install Endpoint Security for use in ePolicy Orchestrator & standalone or self-managed environments.
  • Identify the different ways to deploy the required software components to endpoint systems.
  • Configure common settings that apply to all Endpoint Security modules & features

Yes, you can.

We use the best standards in Internet security. Any data retained isn't shared with third parties.

It is recommended but not mandatory. Being acquainted with the primary training material will enable professionals & the trainer to move at the desired pace during classes. You can access training for most vendors.

You can buy online from the page by clicking on "Buy Now". You can view alternate payment methods on the payment options page.

Yes, professionals can pay from the training page.

The training completion certification will be awarded to all the professionals who've 

completed the training program & the project assignment given by your instructor. You may use the certificate in your future job interviews will surely help you to l& your dream job.

Send a Message.


  • Enroll